Analysis Overview
SHA256
49cc4a9b9c6a3ffab8832a6f41b8a1ccc6025d7cc1e948025c9e24eb921706ac
Threat Level: Likely malicious
The file 49cc4a9b9c6a3ffab8832a6f41b8a1ccc6025d7cc1e948025c9e24eb921706acN.exe was found to be: Likely malicious.
Malicious Activity Summary
Sets file to hidden
Executes dropped EXE
Deletes itself
Checks computer location settings
Indicator Removal: File Deletion
Drops file in Windows directory
System Location Discovery: System Language Discovery
Unsigned PE
Enumerates physical storage devices
Views/modifies file attributes
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Checks processor information in registry
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-14 02:21
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-14 02:21
Reported
2024-11-14 02:23
Platform
win7-20241023-en
Max time kernel
111s
Max time network
94s
Command Line
Signatures
Sets file to hidden
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\cmd.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Debug\zskhost.exe | N/A |
Indicator Removal: File Deletion
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Debug\zskhost.exe | C:\Users\Admin\AppData\Local\Temp\49cc4a9b9c6a3ffab8832a6f41b8a1ccc6025d7cc1e948025c9e24eb921706acN.exe | N/A |
| File opened for modification | C:\Windows\Debug\zskhost.exe | C:\Users\Admin\AppData\Local\Temp\49cc4a9b9c6a3ffab8832a6f41b8a1ccc6025d7cc1e948025c9e24eb921706acN.exe | N/A |
| File opened for modification | C:\Windows\Debug\zskhost.exe | C:\Windows\SysWOW64\attrib.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\49cc4a9b9c6a3ffab8832a6f41b8a1ccc6025d7cc1e948025c9e24eb921706acN.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\attrib.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\Debug\zskhost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Windows\Debug\zskhost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Windows\Debug\zskhost.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\49cc4a9b9c6a3ffab8832a6f41b8a1ccc6025d7cc1e948025c9e24eb921706acN.exe | N/A |
Suspicious use of WriteProcessMemory
Views/modifies file attributes
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\49cc4a9b9c6a3ffab8832a6f41b8a1ccc6025d7cc1e948025c9e24eb921706acN.exe
"C:\Users\Admin\AppData\Local\Temp\49cc4a9b9c6a3ffab8832a6f41b8a1ccc6025d7cc1e948025c9e24eb921706acN.exe"
C:\Windows\SysWOW64\attrib.exe
attrib +a +s +h +r C:\Windows\Debug\zskhost.exe
C:\Windows\Debug\zskhost.exe
C:\Windows\Debug\zskhost.exe
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\49CC4A~1.EXE > nul
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | www.baidu.com | udp |
| HK | 103.235.47.188:80 | www.baidu.com | tcp |
| US | 8.8.8.8:53 | EwJC5j8Iq.nnnn.eu.org | udp |
| US | 8.8.8.8:53 | nd0NqhcQuY.nnnn.eu.org | udp |
Files
memory/2812-0-0x0000000000400000-0x0000000000410000-memory.dmp
C:\Windows\Debug\zskhost.exe
| MD5 | e061cef12b3a10e54973fbf81e688ccd |
| SHA1 | 7c12d0f08c738f183bd3f3d195d567486f8e2529 |
| SHA256 | 5969848a1cd52978c8c2da4452b6d0d2b2fad928d407dde419e16ec4f7887b3a |
| SHA512 | 4c58e02944ca90181e8a71cbff888ffa30228f6196a7bd9421bac26b07ee649b8d0df6497b068fd2b3368d709d1c17d60f328cf716b2413d54fa90a9628e6745 |
memory/2812-5-0x0000000000400000-0x0000000000410000-memory.dmp
memory/3024-6-0x0000000000400000-0x0000000000410000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-14 02:21
Reported
2024-11-14 02:23
Platform
win10v2004-20241007-en
Max time kernel
111s
Max time network
96s
Command Line
Signatures
Sets file to hidden
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\49cc4a9b9c6a3ffab8832a6f41b8a1ccc6025d7cc1e948025c9e24eb921706acN.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Debug\uauhost.exe | N/A |
Indicator Removal: File Deletion
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Debug\uauhost.exe | C:\Users\Admin\AppData\Local\Temp\49cc4a9b9c6a3ffab8832a6f41b8a1ccc6025d7cc1e948025c9e24eb921706acN.exe | N/A |
| File opened for modification | C:\Windows\Debug\uauhost.exe | C:\Users\Admin\AppData\Local\Temp\49cc4a9b9c6a3ffab8832a6f41b8a1ccc6025d7cc1e948025c9e24eb921706acN.exe | N/A |
| File opened for modification | C:\Windows\Debug\uauhost.exe | C:\Windows\SysWOW64\attrib.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\49cc4a9b9c6a3ffab8832a6f41b8a1ccc6025d7cc1e948025c9e24eb921706acN.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\Debug\uauhost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\attrib.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Windows\Debug\uauhost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Windows\Debug\uauhost.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\49cc4a9b9c6a3ffab8832a6f41b8a1ccc6025d7cc1e948025c9e24eb921706acN.exe | N/A |
Suspicious use of WriteProcessMemory
Views/modifies file attributes
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\49cc4a9b9c6a3ffab8832a6f41b8a1ccc6025d7cc1e948025c9e24eb921706acN.exe
"C:\Users\Admin\AppData\Local\Temp\49cc4a9b9c6a3ffab8832a6f41b8a1ccc6025d7cc1e948025c9e24eb921706acN.exe"
C:\Windows\SysWOW64\attrib.exe
attrib +a +s +h +r C:\Windows\Debug\uauhost.exe
C:\Windows\Debug\uauhost.exe
C:\Windows\Debug\uauhost.exe
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\49CC4A~1.EXE > nul
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.baidu.com | udp |
| HK | 103.235.47.188:80 | www.baidu.com | tcp |
| US | 8.8.8.8:53 | 73.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 188.47.235.103.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 24.139.73.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | K94uIsXrHW.nnnn.eu.org | udp |
| US | 8.8.8.8:53 | uLlaaM1z1k.nnnn.eu.org | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
Files
memory/5024-0-0x0000000000400000-0x0000000000410000-memory.dmp
C:\Windows\debug\uauhost.exe
| MD5 | 0a93787ebee0280558229e1b5126b2a9 |
| SHA1 | d67af1d9f17847c48b0db22d0bc8a635df06da90 |
| SHA256 | 91c741f03a408366dc0b19e8582a93299ef40c99881f356796f5f90ad204f779 |
| SHA512 | 2223138e4134715239be1b3243a88c62584978f81615d453af6b40df2805ee9d215a83867ac7c4d9d58f4d88aab68e393767365e47a26979f8896221f35c54f9 |
memory/5024-5-0x0000000000400000-0x0000000000410000-memory.dmp
memory/3104-6-0x0000000000400000-0x0000000000410000-memory.dmp